Certified Professional Ethical Hacker

Curso

En Miguel Hidalgo

$ 50,976.00 más IVA

*Precio estimado

Importe original en USD:

$ 3,000

Llama al centro

¿Necesitas un coach de formación?

Te ayudará a comparar y elegir el mejor curso para ti y a financiarlo en cómodas cuotas mensuales.

Descripción

  • Tipología

    Curso

  • Nivel

    Nivel intermedio

  • Lugar

    Miguel hidalgo

  • Horas lectivas

    35h

  • Duración

    5 Días

  • Inicio

    Fechas disponibles

Mile2

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack. The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security
posture, help implement controls to better secure your company’snetwork infrastructure and how to combat against hackers and/or viruses, etc.

Precisiones importantes

Documentos

  • PEH_Certified_Professional_Ethical_Hacker.pdf

Sedes y fechas disponibles

Ubicación

Inicio

Miguel Hidalgo (Ciudad de México (Distrito Federal))
Ver mapa
Bosque de Duraznos 65-601a, Col. Bosque de Las Lomas, 11700

Inicio

Fechas disponiblesInscripciones abiertas
Fechas disponiblesInscripciones abiertas

Acerca de este curso

• Information System Owners
• Security Officers
• Ethical Hackers
• Information Owners
• Penetration Testers
• System Owner and Managers
• Cyber Security Engineers

VA, S.

Preguntas & Respuestas

Añade tu pregunta

Nuestros asesores y otros usuarios podrán responderte

¿Quién quieres que te responda?

Déjanos tus datos para recibir respuesta

Sólo publicaremos tu nombre y pregunta

Opiniones

Materias

  • Seguridad de redes
  • Seguridad
  • Informática aplicada
  • Redes
  • Computadoras
  • Conectividad redes
  • Redes de datos
  • Redes digitales
  • Seguridad informática
  • Servidor de contenidos
  • Electrónica de microprocesadores
  • Instalación
  • Seguridad en internet

Profesores

Hector Solis

Hector Solis

Gerente de TI

Programa académico

Course Outline

· Security Fundamentals

§ Overview

§ The Growth of

§ Environments and Security

§ Our Motivation…

§ The Goal: Protecting Information!

§ CIA Triad in Detail

§ Approach Security Holistically

§ Security Definitions

§ Definitions Relationships

§ Method: Ping

§ The TCP/IP Stack

§ Which Services Use Which Ports?

§ TCP 3-Way Handshake

§ TCP Flags

§ Malware

§ Types of Malware

§ Types of Malware Cont...

§ Types of Viruses

§ More Malware: Spyware

§ Trojan Horses

§ Back Doors

§ DoS

§ DDoS

§ Packet Sniffers

§ Passive Sniffing

§ Active Sniffing

§ Firewalls, IDS and IPS

§ Firewall – First

§ Line of Defense

§ IDS – Second Line of Defense

§ IPS – Last Line of Defense?

§ Firewalls

§ Firewall Types:

§ (1) Packet Filtering

§ Firewall Types:

§ (2) Proxy Firewalls

§ Firewall Types –

§ Circuit-Level Proxy Firewall

§ Type of Circuit-

§ Level Proxy – SOCKS

§ Firewall Types –

§ Application-Layer Proxy

§ Firewall Types: (3) Stateful

§ Firewall Types:

§ (4) Dynamic Packet-Filtering

§ Firewall Types:

§ (5) Kernel Proxies

§ Firewall Placement

§ Firewall Architecture

§ Types – Screened Host

§ Multi- or Dual-Homed

§ Screened Subnet

§ Wi-Fi Network Types

§ Wi-Fi Network Types

§ Widely Deployed Standards

§ Standards Comparison

§ 802.11n - MIMO

§ Overview of Database Server

§ Review

· Access Controls

§ Overview

§ Role of Access Control

§ Definitions

§ More Definitions

§ Categories of Access Controls

§ Physical Controls

§ Logical Controls

§ “Soft” Controls

§ Security Roles

§ Steps to Granting Access

§ Access Criteria

§ Physical Access

§ Control Mechanisms

§ Biometric System Types

§ Synchronous Token

§ Asynchronous Token Device

§ Memory Cards

§ Smart Card

§ Cryptographic Keys

§ Logical Access Controls

§ OS Access Controls

§ Linux Access Controls
§ Accounts and Groups

Llama al centro

¿Necesitas un coach de formación?

Te ayudará a comparar y elegir el mejor curso para ti y a financiarlo en cómodas cuotas mensuales.

Certified Professional Ethical Hacker

$ 50,976.00 más IVA

*Precio estimado

Importe original en USD:

$ 3,000